MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER

Size: px
Start display at page:

Download "MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER"

Transcription

1 MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER Alireza Nemaney Pour 1, Raheleh Kholghi 2 and Soheil Behnam Roudsari 2 1 Dept. of Software Technology Engineering, Islamic Azad University of Abhar, Iran pour@abhariau.ac.ir 2 Dept. of IT Engineering, Sharif University of Technology, Kish Island, Iran {r.kholghi,soheil.bh}@gmail.com ABSTRACT Unsolicited Bulk s (also known as Spam) are undesirable s sent to massive number of users. Spam s consume the network resources and cause lots of security uncertainties. As we studied, the location where the spam filter operates in is an important parameter to preserve network resources. Although there are many different methods to block spam s, most of program developers only intend to block spam s from being delivered to their clients. In this paper, we will introduce a new and efficient approach to prevent spam s from being transferred. The result shows that if we focus on developing a filtering method for spams s in the sender mail server rather than the receiver mail server, we can detect the spam s in the shortest time consequently to avoid wasting network resources. KEYWORDS Anti-spams, Receiver mail server, Sender mail server, Spam 1. INTRODUCTION An is considered spam when a massive number of them are sent to multiple recipients. Spam is usually used for advertisement or marketing. These unwanted s cause drawbacks to the recipient, and consume the users network resources. The disadvantages of spam s have been addressed in many occasions. In some cases for a single user 9 out of 10 s are spams that fill his/her inbox. The United States Federal Trade Commission described that 66% of spams have false information somewhere in the message and 18% of spams advertise Adult material. According to another report [1] 12% of users spend half hour or more per day dealing with spam s. There are several major problems with spam mails. First of all, they are high in volume and fill in mailbox of users. Secondly, there is no correlation between receivers area of interests and the contents of spam mails. Thirdly, they cost money for ISPs because the bandwidth and the memory of system are wasted. Finally, Spam s cause a lot of security problems because most of them include Trojan, Malwares, and viruses [2]. Many filtering techniques have been developed to control the flow of spam s. Unfortunately, even with these available techniques, the number of spam s is growing and the flow has not been controlled completely. The setback is that there is no actual solution because a spammer; an unidentified user with enough knowledge is able to be familiar with the logic of the filtering mechanisms. As a result, bypassing the filter and sending the spam s DOI : /ijnsa

2 seems not to be a difficult task for such spammers. In such cases, the spam s are not detected and are considered as legitimate ones. There are studies regarding spam filtering [3-11]. The common issue with the usage of all of these techniques is that the filtering systems are set up in the receiver mail server, consequently, causing network load and wasting network resources. To preserve network resources such as bandwidth and memory, and to reduce network load, this paper proposes to locate spam filtering in the sender mail server rather than the receiver mail server. Moreover, this paper by experimental results shows that this novel approach works more efficiently compared with the previously proposed approaches. This paper is organized as follows. In section 2, the related work to the subject will be highlighted. The Overview of system and its operation are described in section 3. Our proposal and the experiment results are presented in section 4 and 5 respectively. Finally, the conclusion is shown in section RELATED WORK As stated before, there are many filtering techniques to stop the flow of spam s to mail boxes [3-12]. Figure 1 simply illustrates the classification of spam filtering techniques. The classification includes list-based filtering [3-7], static algorithm [8-10], and IP-based filtering [11]. The list-based filtering is classified into three categories; Blacklist [3], Whitelist [4, 5], and Greylist [6, 7]. Static algorithm is classified into content-based [8, 9], and the rulebased [10] filtering. Finally, IP-based filtering consists of revers-lookup [11]. In the Blacklist filtering [3], the IP address and the domain name of the sender server is stored in a list called Blacklist and the s from that IP address and domain are blocked. Then, based on the policy of the receiver side, the s from the Blacklisted IP addresses are deleted or sent to spam folder. Conversely, there are some limitations for the Blacklist filtering. First, since the spammer uses several IP addresses with a variety of domain names, updating these lists is a difficult task for the client. Consequently, updating the Blacklist regularly is costly. Second, Blacklist filtering may result in identification of an as false negative because of minimal control in this methodology. On the other side of the Blacklist, is the Whitelist filtering [4, 5]. In this technique, any user stores his/her contacts in a list called the Whitelist. Therefore, any received with the correspondent address from this list is accepted, and all other addresses out of this list are considered uncertain. In this technique, also there are certain obstacles. The obvious one is that, since the sender is unidentified and unpredictable, it is difficult to insert all possible sender addresses in this list. Similar to the Blacklist, the Whitelist filtering needs to be updated regularly; which is a costly task for the user. Another major issue is that if the address of a spammer is added in the Whitelist of an client once, this will provide access to all of the addresses in the Whitelist of that specific client without any boundaries or limits. As a result, this will ensure the spammer more reachable addresses. In Greylist filtering [6], a different approach is practiced. This technique can be set either on the mail server of the receiver or/and on the personal receiver anti-spam application. At first step, all received s are rejected. Because of this policy, spammers do not try to resend the rejected since it is time consuming for them. Instead, the spammers prefer to search for another address without Greylist filtering. Moreover, from the behavior of spammer viewpoint, the Greylist by itself provides a usable contact list of the mail servers using this filtering technique, subsequently; the spammer avoids sending more messages to those servers after the first rejection because spammer can recognize what the receiver mail server filtering structure is, and how it operates. Consequently, the spammer will update his techniques in order to bypass Greylist filtering. Finally, a major weakness observed in this technique is that there is 54

3 Figure. 1 Classification of Spam Detection Methods a possibility that legitimate messages may be lost [6, 7]. Content-based filtering [8, 9] is another filtering technique that uses machine learning criteria. In order to have the satisfactory results, the administrator of the mail server needs to train the filters to perform their functions. This filtering starts to work based on some predefined words after the is received entirely. These particular words are collected by statistical reports based on the words and phrases gathered from the spam s. Rule based filtering [10] is similar to content-based one with some differences. This technique works through some certain rules and regulations. By these rules the filter decides to pass or to block the received . The major problem with the content and rule based filtering is that, the rules and the words are verified by the programmer. This leads to variable restrictions. First, the databases and the policies need to be updated at regular basis. Second, as all spammers are aware of these filters, and their functionality, they will try to deliver their messages using additional characters to legitimize their s. Finally, these techniques work after the body of the is completely received by the mail server which increases the time for checking whether the message is spam or not. In reverse lookup, also known as a reverse DNS (Domain Name System) lookup, the host is associated with a given IP (Internet Protocol) address. By using this routine, the receiver can confirm the identity of the domain name of the sender. This technique is not effective for the mobile users and the users with invalid IP address [11]. Authors in [12] introduce a new procedure based on the spammer behavior. Commonly, a spammer sends an (s) to huge number of users. In this filtering, the administrator sets a counter on mail server to limit the number of the s which its clients wish to send. This counter-based filtering provides time saving because the mail server can decide whether a mail is spam or not before the message is completely received. But its restriction is that the legitimate s may not pass the counter filter. As spammers become more dominant, the number of anti-spam methodologies and software are growing correspondingly. The problem is that even with the most accurate anti-spam techniques, we lose lots of network resources such as time and bandwidth because these techniques are set on the receiver server side. In most of web based services such as Hotmail, AOL, and Yahoo, filtering s start after they are fully received by the receiver mail servers. In this paper we propose shifting the location of the filtering system from the receive mail server to the sender mail server to achieve efficient results. For this purpose, we define four scenarios and evaluate the results with two anti-spam software, DSPAM 1, and TREC 2. These software systems are open source programs, and include all filtering techniques stated above. 1 DSPAM: 2 TREC: Text REtrieval Conference. 55

4 Figure. 2 SMTP Transaction Commands 3. OVERVIEW OF SYSTEM In this section, a brief explanation of protocol and the process of filtering will be elaborated. Simple Mail Transfer Protocol (SMTP) is the first protocol which transfers the s by some commands. Figure 2 illustrates SMTP commands. First, TCP/IP (Transmission Control protocol and Internet Protocol) connection starts between sender and the associated mail server. Following that, the SMTP commands begin with a Hello message and announcing the acceptance of the session between the client and the server. This process ends when the message is accepted by the mail server. TCP connection disconnects if there is no more message from the client to the mail server. 3. OVERVIEW OF SYSTEM In this section, a brief explanation of protocol and the process of filtering will be elaborated. Simple Mail Transfer Protocol (SMTP) is the first protocol which transfers the s by some commands. Figure 2 illustrates SMTP commands. First, TCP/IP (Transmission Control protocol and Internet Protocol) connection starts between sender and the associated mail server. Following that, the SMTP commands begin with a Hello message and announcing the acceptance of the session between the client and the server. This process ends when the message is accepted by the mail server. TCP connection disconnects if there is no more message from the client to the mail server. When the is delivered by the server, the filtering phase is started. Based on the server filtering policy, Blacklist and Whitelist filtering is stared to examine if the is a spam or a valid one. If the is recognized as a valid one, it is sent to receiver s inbox otherwise the is blocked or transferred to the spam folder. When a Greylist filtering is used in relevant 56

5 mail server, the is rejected for the first time. Afterward the body of the is tested with content-based and rule-based filters according to the standards of the administrator. 4. STRUCTURE OF OUR PROPOSAL This section describes our proposal. The main purpose of this approach is to detect spam s in 1 the shortest time and consequently to avoid wasting network resources by shifting the location of the filtering system from the receiver mail server to sender mail server (Figure 3). In this 2 way, all s are screened and checked before being permitted to proceed to the receiver mail server. Figure 4 illustrates the structure of sending an with necessary filtering steps. The procedure consists of four steps, IP validity check for sender and receiver, list-based filtering, and statistical algorithm. 3 First, the validity of IP address of the sender is checked by its mail server. When the client is invalid, the connection is terminated. Otherwise, the mail is preceded to next step. 4 Second, the validity of the address of the receiver is checked by the DNS server. When the address of the receiver is not available, or wrong, the mail server sends 5 back a failure message to the sender, and the connection is terminated. Otherwise, the mail is preceded to list-based filtering. Third, the should be checked by the list-based filtering such as Whitelist, Blacklist, and Greylist. By passing these filtering the is preceded to next step. When an cannot pass one of these filtering, the connection is terminated. Forth, the statistical filtering such as, content-base and rule-based filtering is started. s that cannot be verified as valid ones are not sent. Finally, the valid s are sent to the receiver mail server. Figure. 3 Shifting the location of filtering system to sender mail server 57

6 Figure. 4 An algorithm of filtering in sender mail server Our proposal is a new approach to prevent spam s. Its novelty is that we introduce the filtering methods in the sender mail server rather than the receiver mail server. By this approach, invalid s are not transferred to the receiver mail server because of filtering in the sender mail server. Consequently, the network resources, such as bandwidth, time, and memory is preserved. In the next section, we will illustrate the efficiency of this approach by fortifying it with experimental results. 5. EXPERIMENT RESULTS This section describes experiment results. We analyse our proposed model and compare the performance of filtering system when is set up on different locations. Figure 5 illustrates the observation model assuming that the spammer is going to send s through the mail server A. Four scenarios are defined based on changing the location of filtering system as follows: (1) The spammer is going to send s through the mail server A to the mail server B, and B checks the s (Figure 5 scenario 1). (2) The spammer is going to send s through the mail server A to different mail servers such as B, C, D, and they check the received s respectively (Figure 5 scenario 2) (3) The spammer is going to send s through the mail server A to mail server B, and A checks the s (Figure 5 scenario 3). (4) The spammer is going to send s through the mail server A to different mail servers such as B, C, D, and the mail server A checks the s (Figure 5 scenario 4). 58

7 Scenario 1: Mail server B checks s Scenario2. Mail servers B, C, D, checks s respectively. Scenario3. Mail server A checks s being sent to mail server B Scenario4. Mail server A checks s being sent to the mail servers B, C, D Figure. 5 Observation model assuming that the spammer sends s through the mail server A For our experiment, we used the results that concluded from various sources [13]. Figure 6 illustrates the result of the performance of anti-spam software running on different ISPs compared with two representative open source anti-spams software. This Figure shows the time required to process s in the receiver mail server. The required time to process s at ISPs such as Hotmail, AOL and Microsoft are, 0.1, 0.09, and 0.1 second respectively. On the other hand, the results of our experiment with two representative anti-spam software such as TREC and DSPAM shows that the required time to process s are 200 and 250 seconds. This result shows that the performance of filtering in ISPs is better compared with open source software. The factors that directly affect the performance of filtering discrepancies are based on the size of , processor power, and several others. Later, we will use the outcomes of this experimentation for the four scenarios explained above. As experimental results illustrated in Figure 7, we fulfilled our four scenarios. Starting from scenario 1, the mail server B checks all s one by one. For this purpose, the mail server B puts each single in its specific memory based on each IP address in the . As a result, the server consumes more time for the same . The result of this scenario for each anti-spam system is shown with the rightmost bar in Figure 7. 59

8 Figure. 6 The performance comparison of filtering between ISPs and open source software in receiver mail server In scenario 2 the receiver mail servers, B, C and D check all the received s. In order to send each , the mail server A is required to establish a session with associate mail servers. For this purpose, the receiver mail servers, B, C, and D should accept the sessions for each IP address. The result of this scenario is similar to the first scenario because we consider the total process time for scenario 2. Results of this scenario are shown with blue bar in Figure 7. In the third scenario the spam filtering is performed in the sender mail server. When the spammer attempts to send s to different clients, the anti-spam software starts to process filtering on the just once. If the is recognized as trustable , it is sent to B. Otherwise this will be deleted. The advantage of filtering in the sender mail server is that the network resources between the servers are preserved. The results are displayed with green bars in Figure 7. In the last scenario, the sender sends s to several recipients on different mail servers Time (sec) Hotmail AOL Microsoft TREC DSPAM scenario 4 scenario 3 scenario 2 scenario 1 Figure. 7 The performance comparison of spam mail filtering between sender and receiver mail servers. 60

9 This time the mail server A should check the s. Before any action for filtering, the mail server A needs to establish sessions with the other mail servers. For this reason, the process time is longer than the time required in scenario 3. The anti-spam processing in the sender mail server uses less time when compared the same procedure performed on the receiver mail server. Results are demonstrated with red bars. The outcome of these assessments, as shown in Figure. 7, imply that scenarios 3 and 4 have better performance compared with scenarios 1 and 2 under all conditions. It is because the filtering process is performed in the sender mail server. Moreover, the performance of scenario 4 is not satisfactory compared with scenario 3 because the sender mail server needs to check the domain of each receiver mail server. In this case, the performance level falls, however still it is considerably better than the cases where the filtering is checked in the receiver mail server (scenarios 1 and 2). Although the results for TREC and DSPAM are based on our experiments, the results for ISPs such as Hotmail, AOL and Microsoft have been calculated logically based on our prediction extracted from Figure. 6. On the other hand, scenario 3 indicates that when the filtering system is located in the sender mail server, the processed time becomes n times less than the time when the filtering system is in the receiver mail server when n indicates the number of processed s. Spam mail detection is a challenging work against human mind because spammers try to find new ways to bypass filtering systems. Therefore, it seems that it is a difficult task to read the spammers mind and to find all the possible tricks that they might develop. To overcome this problem, we suggest developing methods to provide high performance in the shortest time. Spam mail filtering in the sender mail server (our proposal) is one of those methods compared with the filtering in the receiver mail server. 6. CONCLUSION In this paper, we have proposed an efficient approach for spam detection. Our approach proposes to shift the location of spam filtering system from receiver mail server to sender mail server. The purpose of this novel idea is to detect spam s in the shortest time and consequently to prevent wasting the network resources from misusage of spammers. In addition, by experimental results we proved that our idea is efficient because just the resources in the sender side are accessed. This implies that if an is identified as spam one, the receiver s bandwidth and memory is preserved which will assure a better performance. Finally, by locating the filtering system in the sender mail server; the processed time becomes n times less than the time when the filtering system is in the receiver mail server when n indicates the number of processed s. REFERENCES [1] C. MacFarlane, (2003), FTC Measures False Claims Inherent in Random Spam, Federal Trade Commission, Accessed Jul. 20, [2] L. Nosrati & A. Nemaney Pour, Dynamic Concept Drift Detection for Spam Filtering, Proceedings of ACEEE 2nd International Conference on Advances Information and Communication Technologies (ICT 2011), Amsterdam, Netherlands, pp , Dec [3] A. Ramachandran, D. Dagon & N. Feamster, Can DNS-Based Blacklists Keep Up with Bots?, The Third Conference on and Anti-Spam (CEAS 2006), California, USA, pp.1-2, Jul [4] J. Goodman, Spam: Technologies and Policies, White Paper, Microsoft research, pp.1-19, Feb

10 [5] A.Ramachandran & N. Feamster, Understanding the Network-Level Behavior of Spammers, Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2006), Pisa, Italy, pp , Sep [6] E. Harris, (2003), Greylisting: The Next Step in the Spam Control War, White Paper, Accessed Dec. 20, [7] J.R. Levine, Experience with Greylisting, Proceedings of Second Conference on and Anti- Spam (CEAS 2005), CA, USA, pp. 1-2, Jul [8] P. Graham, Better Bayesian filtering, MIT Spam Conference, Jun [9] H. Yin & Z. Chaoyang, An Improved Bayesian Algorithm for Filtering Spam , IEEE 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC 2011), Huangzhou, China, pp , Oct [10] A. Ciltik & T. Gungor, (2008), Time-efficient spam filtering using n-gram models, Elsevier, Pattern Recognition Letters, Vol. 29, No. 1, pp [11] B. Agrawal, N. Kumar & M. Molle, Controlling Spam at the Routers, Proceedings of the IEEE International Conference on Communications (ICC 2005), Seoul, Korea, pp , May [12] R. Kholghi, S. Behnam Roudsari & A. Nemaney Pour, An Efficient Spam Mail Detection by Counter Technique, Proceedings of International Conference on Computer Science and Information Technology (ICCSIT 2011), Penang, Malaysia, pp , Feb [13] Y. Luo, (2010), Workload characterization of spam filtering systems, International Journal of Network Security & Its Application (IJNSA), Vol. 2, No. 1, pp Authors Alireza Nemaney Pour 1 has obtained his B.S degree in Computer Science from Sanno University, Japan, M.S in Computer Science from Japan Advanced Institute of Science And Technology, Japan, and Ph.D. degree in Information Network Science from Graduate School of Information Systems, the University of Electro-Communications, Japan. He is currently a faculty member of Islamic Azad University of Abhar in Iran. In addition, He is a technical advisor of J-Tech Corporation in Japan. His research interests include Network Security, Group Communication Security, Protocol Security, Information Leakage, Spam Mail Prevention, Web Spam Detection, and Cryptography. Raheleh Kholghi 2 has received her B.Sc. from Azad University in software engineering and M.Sc. degree in Information Technology Engineering from Sharif University of Technology, International Campus, Iran in She works currently in Telecommunication Kish Company (TKC) as an IT engineer. Her research area is about network and its application security. Soheil Behnam Roudsari 2 has received his B.Sc. in Information Technology Engineering from Sharif University of Technology, International Campus, Iran. He is currently a M.Sc. student in Engineering of Computer Systems, Politecnico Di Milano University, Italy. His area of research interest is Network Security. 62

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

About this documentation

About this documentation Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to

More information

escan Anti-Spam White Paper

escan Anti-Spam White Paper escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,

More information

Spam Filtering Methods for Email Filtering

Spam Filtering Methods for Email Filtering Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: akshaygulhane91@gmail.com Sakshi Gudadhe Third year B.E. (CSE) E-mail: gudadhe.sakshi25@gmail.com Shraddha A.

More information

COAT : Collaborative Outgoing Anti-Spam Technique

COAT : Collaborative Outgoing Anti-Spam Technique COAT : Collaborative Outgoing Anti-Spam Technique Adnan Ahmad and Brian Whitworth Institute of Information and Mathematical Sciences Massey University, Auckland, New Zealand [Aahmad, B.Whitworth]@massey.ac.nz

More information

Spam detection with data mining method:

Spam detection with data mining method: Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

A Survey on Spam Filtering for Online Social Networks

A Survey on Spam Filtering for Online Social Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

OUTLOOK SPAM TUTORIAL

OUTLOOK SPAM TUTORIAL OUTLOOK SPAM TUTORIAL You can find this at http://www.sitedeveloper.ws/tutorials/spam.htm. Look for the yellow highlighting and red text in this article below to know where to add the EXODUSNetwork domain

More information

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME

6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)

More information

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science

More information

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques

More information

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008 ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning

More information

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Abstract Manabu IWANAGA, Toshihiro TABATA, and Kouichi SAKURAI Kyushu University Graduate School of Information

More information

Dealing with spam mail

Dealing with spam mail Vodafone Hosted Services Dealing with spam mail User guide Welcome. This guide will help you to set up anti-spam measures on your email accounts and domains. The main principle behind dealing with spam

More information

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

BARRACUDA. N e t w o r k s SPAM FIREWALL 600 BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

An In-depth Analysis of Spam and Spammers

An In-depth Analysis of Spam and Spammers An In-depth Analysis of Spam and Spammers Dhinaharan Nagamalai Wireilla Net Solutions Inc,Chennai,India Beatrice Cynthia Dhinakaran, Jae Kwang Lee Department of Computer Engineering, Hannam University,

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2 International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

More information

How to Add HealthCentral to Your Safe Senders List

How to Add HealthCentral to Your Safe Senders List How to Add HealthCentral to Your Safe Senders List Due to the growing problem of unsolicited and unwanted commercial emails, many web mail services and email applications have taken measures to automatically

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

AntiSpam QuickStart Guide

AntiSpam QuickStart Guide IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Why Content Filters Can t Eradicate spam

Why Content Filters Can t Eradicate spam WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate

More information

Good Practice use of Outlook, Thunderbird and HORDE Webmail

Good Practice use of Outlook, Thunderbird and HORDE Webmail Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail mdisupport@midwestdatainc.com.

More information

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10 Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information

Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,

More information

Achieve more with less

Achieve more with less Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering

More information

Some fitting of naive Bayesian spam filtering for Japanese environment

Some fitting of naive Bayesian spam filtering for Japanese environment Some fitting of naive Bayesian spam filtering for Japanese environment Manabu Iwanaga 1, Toshihiro Tabata 2, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, Kyushu

More information

Singlefin. e-mail protection services. Spam Filtering. Building a More Accurate Filter @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ By Lawrence Didsbury, MCSE, MASE

Singlefin. e-mail protection services. Spam Filtering. Building a More Accurate Filter @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ By Lawrence Didsbury, MCSE, MASE Singlefin e-mail protection services Spam Filtering Building a More Accurate Filter @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ By Lawrence Didsbury, MCSE, MASE Executive Summary Every day when your employees

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...

More information

Throttling Outgoing SPAM for Webmail Services

Throttling Outgoing SPAM for Webmail Services 2012 2nd International Conference on Industrial Technology and Management (ICITM 2012) IPCSIT vol. 49 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V49.5 5 Throttling Outgoing SPAM for

More information

White Paper X-Spam for Exchange 2000-2003 Server

White Paper X-Spam for Exchange 2000-2003 Server White Paper X-Spam for Exchange 2000-2003 Server X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam

More information

A Phased Framework for Countering VoIP SPAM

A Phased Framework for Countering VoIP SPAM International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

Anti-Spam Methodologies: A Comparative Study

Anti-Spam Methodologies: A Comparative Study Anti-Spam Methodologies: A Comparative Study Saima Hasib, Mahak Motwani, Amit Saxena Truba Institute of Engineering and Information Technology Bhopal (M.P),India Abstract: E-mail is an essential communication

More information

AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM

AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 212, VOLUME: 2, ISSUE: 3 AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM S. Arun Mozhi Selvi 1 and R.S. Rajesh 2 1 Department

More information

How To Make Sure You Receive New Penn Emails

How To Make Sure You Receive New Penn Emails 3 rd PARTY ORIG I N ATIONS How To Make Sure You Receive New Penn Emails Why Do New Penn Emails Not Reach My Inbox? Depending on the email system you use to check email and the spam filter software it s

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011 Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

Email Spam Detection A Machine Learning Approach

Email Spam Detection A Machine Learning Approach Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Securepoint Security Systems

Securepoint Security Systems HowTo: Configuration of the spam filter Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration of the spam filter with the Securepoint Security Manager... 3 2 Spam filter configuration

More information

Articles Fighting SPAM in Lotus Domino

Articles Fighting SPAM in Lotus Domino Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called

More information

BULLGUARD SPAMFILTER

BULLGUARD SPAMFILTER BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already

More information

Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters

Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Tarek Hassan (B.Sc. Computer Science, Egypt) This thesis is presented for the degree of Master of Computer Science Murdoch University,

More information

How to keep spam off your network

How to keep spam off your network GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam

More information

XGENPLUS SECURITY FEATURES...

XGENPLUS SECURITY FEATURES... Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...

More information

Anglia IT Solutions Managed Anti-SPAM

Anglia IT Solutions Managed Anti-SPAM By Appointment to Her Majesty The Queen Supplier of IT Products and Support Anglia IT Solutions Limited Swaffham Anglia IT Solutions Managed Anti-SPAM A Simple Guide All Rights Reserved. This document

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

How To Stop Spam From Being A Problem

How To Stop Spam From Being A Problem Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

The Role of Country-based email Filtering In Spam Reduction

The Role of Country-based email Filtering In Spam Reduction The Role of Country-based email Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam email By Updated November 1, 2007 Executive Summary The relocation of spamming mail servers,

More information

EXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER

EXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER EXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER Every year, the amount of unsolicited email received by the average email user increases dramatically. According to IDC, spam has accounted for

More information

CZECH UNIVERSITY OF LIFE SCIENCES PRAGUE. Faculty of Economics and Management. Informatics. Department of Information Technologies

CZECH UNIVERSITY OF LIFE SCIENCES PRAGUE. Faculty of Economics and Management. Informatics. Department of Information Technologies CZECH UNIVERSITY OF LIFE SCIENCES PRAGUE Faculty of Economics and Management Informatics Department of Information Technologies Diploma Thesis Abstract SPAM FILTERING Author: Bc. Kateřina Selingerová Supervisor:

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4

What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4 Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Sender Identity and Reputation Management

Sender Identity and Reputation Management Dec 4 th 2008 IT IS 3100 Sender Identity and Reputation Management Guest Lecture by: Gautam Singaraju College of Information Technology University i of North Carolina at Charlotte Accountability on the

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

Enhanced Spam Defence

Enhanced Spam Defence Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated

More information

Bayesian Learning Email Cleansing. In its original meaning, spam was associated with a canned meat from

Bayesian Learning Email Cleansing. In its original meaning, spam was associated with a canned meat from Bayesian Learning Email Cleansing. In its original meaning, spam was associated with a canned meat from Hormel. In recent years its meaning has changed. Now, an obscure word has become synonymous with

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

St. Bernard Managed Protection Services. White Paper. Spam Filtering Building a More Accurate Filter. By Lawrence Didsbury, MCSE, MASE

St. Bernard Managed Protection Services. White Paper. Spam Filtering Building a More Accurate Filter. By Lawrence Didsbury, MCSE, MASE St. Bernard Managed Protection Services By Lawrence Didsbury, MCSE, MASE Executive Summary Spam issues and volume have been escalating in severity for many years. It is one of the key productivity, security

More information

Technical Information www.jovian.ca

Technical Information www.jovian.ca Technical Information www.jovian.ca Europa is a fully integrated Anti Spam & Email Appliance that offers 4 feature rich Services: > Anti Spam / Anti Virus > Email Redundancy > Email Service > Personalized

More information

Celframe - Easy Linux - Lesson 8 - Email Server

Celframe - Easy Linux - Lesson 8 - Email Server - Easy Linux - Lesson 8 - Email Server October 2007 Contents 1 Summary 2 2 Theoretical presentation 2 2.1 Introduction............................... 2 2.2 SMTP................................... 2 2.3

More information

Who will win the battle - Spammers or Service Providers?

Who will win the battle - Spammers or Service Providers? Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse

More information

Guardian Digital Secure Mail Suite Quick Start Guide

Guardian Digital Secure Mail Suite Quick Start Guide Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Quick Start Policy Patrol Spam Filter 9

Quick Start Policy Patrol Spam Filter 9 Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Anti Spamming Techniques

Anti Spamming Techniques Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods

More information

IP Addresses in Email Clients

IP Addresses in Email Clients IP Addresses in Email Clients Joshua Goodman 1 Microsoft Research, Redmond, WA 98052 Abstract. IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing

More information

Novel Mechanism to Defend DDoS Attacks Caused by Spam

Novel Mechanism to Defend DDoS Attacks Caused by Spam Novel Mechanism to Defend DDoS Attacks Caused by Spam Dhinaharan Nagamalai Wireilla Net Solutions Inc, Chennai, India Cynthia Dhinakaran and Jae Kwang Lee Department of Computer Engineering, Hannam University,

More information

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang

Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan

More information

Antispam Evaluation Guide. White Paper

Antispam Evaluation Guide. White Paper Antispam Evaluation Guide White Paper Table of Contents 1 Testing antispam products within an organization: 10 steps...3 2 What is spam?...4 3 What is a detection rate?...4 4 What is a false positive rate?...4

More information

Cloud Email Firewall. 1. Introduction. a. What is Spam?

Cloud Email Firewall. 1. Introduction. a. What is Spam? Cloud Email Firewall 1. Introduction a. What is Spam? Spam are messages which are unsolicited or sent from unknown senders. Usually they are sent in large quantities (even massive) and with commercial

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

Email Marketing Do s and Don ts A Sprint Mail Whitepaper

Email Marketing Do s and Don ts A Sprint Mail Whitepaper Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations

More information

HPL Barracuda Spam/Virus Firewall

HPL Barracuda Spam/Virus Firewall HPL Barracuda Spam/Virus Firewall The Barracuda Spam/Virus Firewall has been deployed behind the HPL Campus Firewall. Its mission is to scan incoming and outgoing mail for known spam and viruses in the

More information

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering

More information